2021
DOI: 10.1007/s00453-021-00858-z
|View full text |Cite
|
Sign up to set email alerts
|

Connected Subgraph Defense Games

Abstract: We study a security game over a network played between a defender and kattackers. Every attacker chooses, probabilistically, a node of the network to damage. The defender chooses, probabilistically as well, a connected induced subgraph of the network of $$\lambda $$ λ nodes to scan and clean. Each attacker wishes to maximize the probability of escaping her cleaning by the defender. On the other hand, the goal of the defender is to maximize the expected number of attackers that sh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1
1

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 17 publications
(36 reference statements)
0
3
0
Order By: Relevance
“…An attacker-defender setting was also studied in [27] where multiple attackers try to inflict damage to nodes on a network, and a single defender tries to protect the nodes by probabilistically patrolling induced connected subgraphs of the network. In that work we showed a general LP-based algorithm for computing Nash equilibria and then focused on special cases of graphs.…”
Section: Auctionsmentioning
confidence: 99%
“…An attacker-defender setting was also studied in [27] where multiple attackers try to inflict damage to nodes on a network, and a single defender tries to protect the nodes by probabilistically patrolling induced connected subgraphs of the network. In that work we showed a general LP-based algorithm for computing Nash equilibria and then focused on special cases of graphs.…”
Section: Auctionsmentioning
confidence: 99%
“…Combinatorics and graph theory play an important role in studying game theory; see [1,2,3,4,8,9,10,22].…”
Section: Introductionmentioning
confidence: 99%
“…Extensive-form games are deployed to model situations in many domains, such as economics [9] and law [10]. Enumerating Nash equilibria allows to list the foreseeable scenarios of such models [11,12]. We consider extensive-form games with two players.…”
Section: Introductionmentioning
confidence: 99%